mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
68 lines
2.8 KiB
JSON
68 lines
2.8 KiB
JSON
{
|
|
"id": "CVE-2024-3460",
|
|
"sourceIdentifier": "cvd@cert.pl",
|
|
"published": "2024-05-14T15:41:12.850",
|
|
"lastModified": "2024-05-14T16:11:39.510",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "In KioWare for Windows (versions all through 8.34)\u00a0it is possible to exit this software\u00a0and use other already opened applications utilizing a short time window before the forced automatic logout occurs. Then, by using some built-in function of these applications, one may launch any other programs.\u00a0\nIn order to exploit this vulnerability external applications must be left running when the KioWare software is launched. Additionally, an attacker must know\u00a0the PIN set for this Kioware instance and also slow down the application with some specific task which extends the usable time window.\n\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "En KioWare para Windows (versiones hasta 8.34) es posible salir de este software y utilizar otras aplicaciones ya abiertas utilizando un breve per\u00edodo de tiempo antes de que se produzca el cierre de sesi\u00f3n autom\u00e1tico forzado. Luego, utilizando alguna funci\u00f3n integrada de estas aplicaciones, se pueden iniciar otros programas. Para aprovechar esta vulnerabilidad, las aplicaciones externas deben dejarse en ejecuci\u00f3n cuando se inicia el software KioWare. Adem\u00e1s, un atacante debe conocer el PIN establecido para esta instancia de Kioware y tambi\u00e9n ralentizar la aplicaci\u00f3n con alguna tarea espec\u00edfica que extienda la ventana de tiempo utilizable."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "cvd@cert.pl",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.4,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.4,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cvd@cert.pl",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-424"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459",
|
|
"source": "cvd@cert.pl"
|
|
},
|
|
{
|
|
"url": "https://cert.pl/posts/2024/04/CVE-2024-3459",
|
|
"source": "cvd@cert.pl"
|
|
},
|
|
{
|
|
"url": "https://www.kioware.com/",
|
|
"source": "cvd@cert.pl"
|
|
}
|
|
]
|
|
} |